CN102077542B - Secure digital communications - Google Patents
Secure digital communications Download PDFInfo
- Publication number
- CN102077542B CN102077542B CN200880130137.1A CN200880130137A CN102077542B CN 102077542 B CN102077542 B CN 102077542B CN 200880130137 A CN200880130137 A CN 200880130137A CN 102077542 B CN102077542 B CN 102077542B
- Authority
- CN
- China
- Prior art keywords
- sender
- recipient
- encryption key
- public encryption
- sending
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域 technical field
本发明涉及数字通信系统,并且更具体地涉及在这种数字通信系统中实现认证的方法和设备。The present invention relates to digital communication systems, and more particularly to methods and apparatus for implementing authentication in such digital communication systems.
背景技术 Background technique
互联网已经革新了进行业务的方式,并已经在非常短的时间间隔内改变了消费者行为。然而,仅当满足一定数量的重要条件时,电子商务才能够实现其全部潜能。这些条件之一将是在互联网、内联网和外部网上传输的数据的潜在安全性。The internet has revolutionized the way of doing business and has changed consumer behavior in a very short span of time. However, electronic commerce can realize its full potential only when a certain number of important conditions are met. One of these conditions will be the potential security of data transmitted on the Internet, intranets and extranets.
因此,对在数字通信系统和网络中的发送方设备和接收方设备之间创建安全的信息封装传送的需求日益增长。在诸如数字业务通信、数字货币交易、数字产品传输等领域中,重要的是信息封装不落入错误的手中,例如落入未授权方的手中或被参与方或未授权的第三方加以篡改。发送方和接收方可以彼此信任也是重要的。Accordingly, there is an increasing need to create secure encapsulated transfers of information between sender and receiver devices in digital communication systems and networks. In areas such as digital business communications, digital currency transactions, digital product transfers, etc., it is important that information encapsulation does not fall into the wrong hands, for example into unauthorized hands or tampered with by participating parties or unauthorized third parties. It is also important that the sender and receiver can trust each other.
发明内容 Contents of the invention
鉴于相关技术的上述和其他缺陷,期望实现一种用于数字通信的改进的方法,具体地,一种用于以改进的安全性、认证和/或可追踪性进行数字通信的改进的方法。此外,有利地,实现包括这些优点和/或改进中至少一些在内的通信系统。另外,有利地,实现使得能够以改进的安全性和/或认证和/或可追踪性进行改进的数字通信的发送方设备和/或接收方设备。In view of the above and other deficiencies of the related art, it is desirable to achieve an improved method for digital communication, in particular, an improved method for digital communication with improved security, authentication and/or traceability. Furthermore, advantageously, a communication system is achieved that includes at least some of these advantages and/or improvements. Furthermore, advantageously, a sender device and/or a receiver device is implemented enabling improved digital communication with improved security and/or authentication and/or traceability.
为了更好地处理一个或多个这些问题,在本发明的第一方面中,提供了一种通信系统中的方法。从而提供了一种通信系统中的方法,用于认证所述通信系统中的发送方设备和接收方设备,其中所述方法包括:由所述发送方设备创建所述发送方设备的标识;由所述接收方设备创建所述接收方设备的标识;由所述发送方设备向所述接收方设备发送与在所述发送方设备和所述接收方设备之间建立关系相关的请求;由所述接收方设备向所述发送方设备至少发送第二主设备的标识;由所述发送方设备向第一主设备发送所述第二主设备的标识;从所述第一主设备向所述第二主设备发送与所述发送方设备为了与所述接收方设备建立通信所需的通信条件相关的请求;从所述第二主设备向所述第一主设备发送所述通信条件;在所述发送方设备满足所述通信条件的情况下,由所述发送方设备向所述第一主设备提供第一访问密钥;以及由所述接收方设备向所述第二主设备提供第二访问密钥。In order to better deal with one or more of these problems, in a first aspect of the present invention, a method in a communication system is provided. There is thus provided a method in a communication system for authenticating a sender device and a receiver device in the communication system, wherein the method includes: creating an identity of the sender device by the sender device; said recipient device creating an identity of said recipient device; sending by said sender device to said recipient device a request related to establishing a relationship between said sender device and said recipient device; by said sender device The receiver device sends at least the identifier of the second master device to the sender device; the sender device sends the identifier of the second master device to the first master device; a second master device sends a request related to a communication condition required by the sender device in order to establish communication with the receiver device; the communication condition is sent from the second master device to the first master device; at When the sender device meets the communication condition, the sender device provides the first access key to the first master device; and the receiver device provides the second access key to the second master device. Two access keys.
所公开的方法可以提供发送方设备和接收方设备之间的改进的数字通信,这是因为发送方设备和接收方设备之间的通信可以涉及至少一个附加通信设备,并且其中,向所述至少一个附加通信设备通信与所述发送方设备和所述接收方设备相关的标识信息。依靠可能在所述发送方设备和所述接收方设备之间的通信的某个阶段所涉及的所述至少一个附加通信设备,数字通信可以在改进的可追踪性方面得以改进。出于相同原因,数字通信可以在改进的安全性方面得以改进。出于相同原因,数字通信可以在改进的认证方面得以改进。出于相同原因,数字通信可以在改进的访问权方面得以改进。The disclosed method may provide improved digital communication between a sender device and a recipient device, since the communication between the sender device and the recipient device may involve at least one additional communication device, and wherein the at least one An additional communication device communicates identification information associated with the sender device and the recipient device. By means of said at least one additional communication device possibly involved at some stage of the communication between said sender device and said receiver device, digital communication may be improved with regard to improved traceability. For the same reason, digital communication can be improved with improved security. For the same reason, digital communication can be improved with improved authentication. For the same reason, digital communication can be improved with improved access.
发往所述接收方设备的与在所述发送方设备和接收方设备之间建立关系相关的请求可以至少包括第一设备组的标识,并且其中所述方法还包括:由所述接收方设备接收所述请求;由所述接收方设备向所述发送方设备至少发送第二设备组的标识;由所述发送方设备接收第二组的标识;在存在同时作为所述第一设备组和所述第二设备组中的设备之一的至少一个第三设备的情况下,由所述发送方设备发送与从所述至少一个第三设备请求关于所述接收方设备的引用相关的请求;由所述接收方设备接收引用请求,并且由所述接收方设备向所述至少一个第三设备发送该请求;由所述接收方设备接收所述引用,并且由所述接收方设备向所述发送方设备发送所述引用;由所述发送方设备接收所述引用;响应于此:由所述发送方设备创建第一公开加密密钥,用于建立从所述发送方设备到所述接收方设备的通信;由所述发送方设备使用所述第一公开加密密钥对所述引用进行加密;由所述发送方设备使用附加公开加密密钥对所述第一公开加密密钥进行加密;由所述发送方设备向所述接收方设备发送已加密的引用和已加密的第一公开加密密钥;由所述接收方设备向所述至少一个第三设备发送已加密的第一公开加密密钥;由所述至少一个第三设备对已加密的第一公开加密密钥进行解密;由所述至少一个第三设备向所述接收方设备发送已解密的第一公开加密密钥;由所述接收方设备对已加密的引用进行解密;以及由所述接收方设备验证已解密的引用。The request to the recipient device related to establishing a relationship between the sender device and the recipient device may include at least an identification of a first group of devices, and wherein the method further comprises: by the recipient device receiving the request; sending, by the recipient device to the sender device, at least an identification of a second group of devices; receiving, by the sender device, an identification of the second group; being simultaneously present as the first group of devices and in the case of at least one third device of one of the devices in the second device group, sending by the sender device a request related to requesting a reference from the at least one third device with respect to the recipient device; receiving a reference request by the recipient device and sending the request to the at least one third device by the recipient device; receiving the reference by the recipient device and sending the request to the at least one third device by the recipient device sending the reference by the sender device; receiving the reference by the sender device; in response thereto: creating, by the sender device, a first public encryption key for establishing an encryption key from the sender device to the recipient communication of a sender device; encryption of said reference by said sender device using said first public encryption key; encryption of said first public encryption key by said sender device using an additional public encryption key ; sending the encrypted reference and the encrypted first public encryption key by the sender device to the receiver device; sending the encrypted first public encryption key by the receiver device to the at least one third device an encryption key; decrypting, by the at least one third device, the encrypted first public encryption key; sending, by the at least one third device, the decrypted first public encryption key to the recipient device; decrypting, by the recipient device, the encrypted reference; and verifying, by the recipient device, the decrypted reference.
所述系统还可以包括第四设备和第五设备,并且所述发送方设备可以与所述第四设备相关联,所述接收方设备与所述第五设备相关联,并且所述第四设备与所述第五设备相关联;并且其中,在不存在同时作为所述第一设备组和所述第二设备组中的设备之一的至少一个第三设备的情况下,所述方法可以包括:由所述发送方设备发送与从所述第五设备请求关于所述接收方设备的引用相关的请求,其中所述请求被发送至所述接收方设备;由所述接收方设备向所述第五设备转发所述请求;由所述第五设备向所述接收方设备发送所述引用;由所述接收方设备向所述发送方设备转发所述引用;由所述发送方设备向所述第四设备发送所述引用;由所述第四设备验证所述引用,并且由所述第四设备向所述发送方设备发送已验证的引用;由所述发送方设备创建第一公开加密密钥,用于建立从所述发送方设备到所述接收方设备的通信;由所述发送方设备使用所述第一公开加密密钥对所述引用进行加密;由所述发送方设备使用附加公开加密密钥对所述第一公开加密密钥进行加密;由所述发送方设备向所述接收方设备发送已加密的引用和已加密的第一公开加密密钥;由所述接收方设备经由所述第五设备向所述第四设备发送已加密的第一公开加密密钥;由所述第四设备对已加密的第一公开加密密钥进行解密;由所述第四设备经由所述第五设备向所述接收方设备发送已解密的第一公开加密密钥;由所述接收方设备对已加密的引用进行解密;以及由所述接收方设备验证已解密的引用。The system may also include a fourth device and a fifth device, and the sender device may be associated with the fourth device, the receiver device is associated with the fifth device, and the fourth device associated with said fifth device; and wherein, in the absence of at least one third device that is both a device in said first device group and said second device group, said method may include : sending, by the sender device, a request related to requesting a reference from the fifth device with respect to the recipient device, wherein the request is sent to the recipient device; sending by the recipient device to the The fifth device forwards the request; the fifth device sends the reference to the receiver device; the receiver device forwards the reference to the sender device; the sender device sends the reference to the sender device the fourth device sends the reference; the fourth device verifies the reference, and the fourth device sends the verified reference to the sender device; the sender device creates a first public encrypted a key for establishing communication from said sender device to said receiver device; said reference is encrypted by said sender device using said first public encryption key; used by said sender device encrypting the first public encryption key with an additional public encryption key; sending the encrypted reference and the encrypted first public encryption key by the sender device to the receiver device; The device sends the encrypted first public encryption key to the fourth device via the fifth device; the encrypted first public encryption key is decrypted by the fourth device; The fifth device sends the decrypted first public encryption key to the recipient device; decrypts, by the recipient device, the encrypted reference; and verifies, by the recipient device, the decrypted reference.
根据第二方面,提供了一种由发送方设备执行以实现认证的方法,所述方法包括:创建所述发送方设备的标识;向接收方设备发送与在所述发送方设备和所述接收方设备之间建立关系相关的请求,其中所述请求至少包括第一设备组的标识;从所述接收方设备至少接收第二设备组的标识;在所述第一设备组和所述第二设备组中存在至少一个公共第三设备的情况下,发送与从所述至少第三设备请求关于所述接收方设备的引用相关的请求;从所述接收方设备接收所述引用;创建第一公开加密密钥,用于建立从所述发送方设备到所述接收方设备的通信;使用所述第一公开加密密钥对所述引用进行加密;使用附加公开加密密钥对所述第一公开加密密钥进行加密;向所述接收方设备发送已加密的引用和已加密的第一公开加密密钥。According to a second aspect, there is provided a method performed by a sender device to achieve authentication, the method comprising: creating an identity of the sender device; A request related to establishing a relationship between a party device, wherein the request includes at least an identifier of a first device group; receives at least an identifier of a second device group from the recipient device; Where there is at least one public third device in the device group, sending a request related to requesting a reference from the at least third device with respect to the recipient device; receiving the reference from the recipient device; creating a first a public encryption key for establishing communication from said sender device to said recipient device; encrypting said reference using said first public encryption key; encrypting said first public encryption key using an additional public encryption key encrypting with a public encryption key; sending the encrypted reference and the encrypted first public encryption key to said recipient device.
所述发送方设备可以与第四设备相关联,所述接收方设备可以与第五设备相关联,并且所述第四设备可以与所述第五设备相关联;并且其中,在所述第一设备组和所述第二设备组中不存在至少一个公共第三设备的情况下,所述方法还可以包括:发送与从所述第四设备请求关于所述接收方设备的引用相关的请求;其中,所述请求可以从所述第四设备转发至所述第五设备;从所述第四设备接收所述引用;创建第一公开加密密钥,用于建立从所述发送方设备到所述接收方设备的通信;使用所述第一公开加密密钥对所述引用进行加密;使用附加公开加密密钥对所述第一公开加密密钥进行加密;以及向所述接收方设备发送已加密的引用和已加密的第一公开加密密钥。The sender device may be associated with a fourth device, the recipient device may be associated with a fifth device, and the fourth device may be associated with the fifth device; and wherein, at the first In the case that there is no at least one common third device in the device group and the second device group, the method may further include: sending a request related to requesting a reference from the fourth device about the recipient device; Wherein, the request may be forwarded from the fourth device to the fifth device; receive the reference from the fourth device; create a first public encryption key for establishing the communication from the sender device to the fifth device; encrypting the reference using the first public encryption key; encrypting the first public encryption key using an additional public encryption key; and sending the encrypted An encrypted reference and an encrypted first public encryption key.
所述引用可以包括序列号,并且所述引用可以与所述第三设备执行的对所述接收方设备的标识相关,并且所述引用可以与所述发送方设备相关联。The reference may include a serial number, and the reference may be related to the identification of the recipient device performed by the third device, and the reference may be associated with the sender device.
所述第一公开加密密钥可以被布置为由所述发送方设备在从所述发送方设备到所述接收方设备的未来通信中使用。The first public encryption key may be arranged to be used by the sender device in future communications from the sender device to the receiver device.
所述方法还可以包括:创建附加公开加密密钥,用于建立从所述发送方设备到第二接收方设备的通信,其中所述附加公开加密密钥可以与所述第一公开加密密钥不同。The method may further comprise creating an additional public encryption key for establishing communication from the sender device to the second recipient device, wherein the additional public encryption key may be identical to the first public encryption key different.
所述方法还可以包括:向第一辅助设备发送与在所述发送方设备和所述接收方设备之间建立关系相关的请求;向所述第一辅助设备发送与从所述至少第三设备请求关于所述接收方设备的引用相关的请求;以及向所述第一辅助设备发送已加密的引用和已加密的第一公开加密密钥。The method may further comprise: sending to a first auxiliary device a request related to establishing a relationship between the sender device and the receiver device; requesting a reference-related request for the recipient device; and sending the encrypted reference and the encrypted first public encryption key to the first accessory device.
所述与在所述发送方设备和所述接收方设备之间建立关系相关的请求、所述与从所述至少第三设备请求关于所述接收方设备的引用相关的请求、以及所述已加密的引用和所述已加密的第一公开加密密钥还可以包括一个数字签名,并且所述数字签名可以与所述发送方设备相关联。The request related to establishing a relationship between the sender device and the recipient device, the request related to requesting a reference to the recipient device from the at least a third device, and the already The encrypted reference and the encrypted first public encryption key may also include a digital signature, and the digital signature may be associated with the sending device.
根据第三方面,提供了一种由接收方设备执行以实现认证的方法,其中所述方法包括:创建所述接收方设备的标识;从发送方设备接收与在所述接收方设备和所述发送方设备之间建立关系相关的请求,其中所述请求至少包括第一设备组的标识;向所述发送方设备至少发送第二设备组的标识;在所述第一设备组和所述第二设备组中存在至少一个公共第三设备的情况下,发送与从所述至少第三设备请求关于所述接收方设备的引用相关的请求;向所述发送方设备发送所述引用;由所述接收方设备接收已加密的引用和已加密的第一公开加密密钥;向所述至少一个第三设备发送已加密的第一公开加密密钥;接收已解密的第一公开加密密钥;对已加密的引用进行解密;以及验证已解密的引用。According to a third aspect, there is provided a method performed by a recipient device to achieve authentication, wherein the method comprises: creating an identity of the recipient device; A request related to establishing a relationship between sender devices, wherein the request includes at least an identifier of a first device group; at least sends an identifier of a second device group to the sender device; When there is at least one public third device in the two-device group, sending a request related to requesting a reference from the at least third device about the receiver device; sending the reference to the sender device; The recipient device receives the encrypted reference and the encrypted first public encryption key; sends the encrypted first public encryption key to the at least one third device; receives the decrypted first public encryption key; decrypting the encrypted reference; and verifying the decrypted reference.
所述发送方设备可以与第四设备相关联,所述接收方设备可以与第五设备相关联,并且所述第四设备可以与所述第五设备相关联;并且在所述第一设备组和所述第二设备组中不存在至少一个公共第三设备的情况下,所述方法还可以包括:发送与从所述第五设备请求关于所述接收方设备的引用相关的请求;其中所述请求从所述第四设备转发至所述第五设备;向所述第五设备发送所述引用;接收已加密的引用和已加密的第一公开加密密钥;经由所述第五设备向所述第四设备发送已加密的第一公开加密密钥;接收已解密的第一公开加密密钥;对已加密的引用进行解密;以及验证已解密的引用。The sender device may be associated with a fourth device, the recipient device may be associated with a fifth device, and the fourth device may be associated with the fifth device; and in the first device group In the case that there is no at least one common third device in the second device group, the method may further include: sending a request related to requesting a reference from the fifth device about the recipient device; wherein the The request is forwarded from the fourth device to the fifth device; the reference is sent to the fifth device; the encrypted reference and the encrypted first public encryption key are received; The fourth device sends the encrypted first public encryption key; receives the decrypted first public encryption key; decrypts the encrypted reference; and verifies the decrypted reference.
根据第四方面,提供了一种由第三设备执行以实现认证的方法,其中所述方法包括:创建所述第三设备的标识;从接收方设备接收关于所述接收方设备的引用请求;由所述第三设备向所述接收方设备发送引用;接收已加密的第一公开加密密钥;对已加密的第一公开加密密钥进行解密;以及向所述接收方设备发送已解密的第一公开加密密钥。According to a fourth aspect, there is provided a method performed by a third device to achieve authentication, wherein the method comprises: creating an identity of the third device; receiving a reference request for the recipient device from a recipient device; sending, by the third device, a reference to the recipient device; receiving an encrypted first public encryption key; decrypting the encrypted first public encryption key; and sending the decrypted public encryption key to the recipient device A first public encryption key.
所述引用可以与由所述第三设备执行的对所述接收方设备的标识相关,并且所述引用可以与所述发送方设备相关联。The reference may be related to an identification of the recipient device performed by the third device, and the reference may be associated with the sender device.
根据第五方面,提供了一种通信设备,包括被配置为执行根据第一、第二、第三或第四方面中任一项所述的方法的电路。According to a fifth aspect, there is provided a communication device comprising circuitry configured to perform the method according to any one of the first, second, third or fourth aspects.
根据第六方面,提供了一种计算机程序产品,包括:计算机程序代码,所述计算机程序代码存储在计算机可读存储介质上,并且当在处理器上执行时,所述计算机程序代码执行根据第一、第二、第三或第四方面中任一项所述的方法。According to a sixth aspect there is provided a computer program product comprising: computer program code stored on a computer-readable storage medium and which, when executed on a processor, performs the 1. The method according to any one of the second, third or fourth aspects.
根据第七方面,提供了一种通信系统中的方法,用于实现对所述通信系统中的发送方设备和接收方设备的认证,其中所述发送方设备与第一标识、第一主设备和第三设备相关联;所述接收方设备与第二标识、第二主设备和所述第三设备相关联;以及其中,所述认证是通过以下方式来实现的:使用所述第一主设备、所述第二主设备以及所述第三设备,以使所述发送方设备和所述接收方设备验证彼此的身份。According to a seventh aspect, there is provided a method in a communication system for implementing authentication of a sender device and a receiver device in the communication system, wherein the sender device is associated with the first identifier and the first master device is associated with a third device; the recipient device is associated with a second identity, a second master device, and the third device; and wherein the authentication is achieved by using the first master device, the second master device, and the third device, so that the sender device and the receiver device verify each other's identities.
根据第八方面,提供了一种由发送方设备执行以实现认证的方法,所述方法包括:创建所述发送方设备的标识;向接收方设备发送与在所述发送方设备和所述接收方设备之间建立关系相关的请求;至少接收第二主设备的标识;向第一主设备发送所述第二主设备的标识;接收与通信条件的确认相关的消息;以及在所述发送方设备满足所述通信条件的情况下,向所述第一主设备提供第一访问密钥。According to an eighth aspect, there is provided a method performed by a sender device to implement authentication, the method comprising: creating an identity of the sender device; receiving at least the identification of the second main device; sending the identification of the second main device to the first main device; receiving a message related to the confirmation of the communication condition; When the device satisfies the communication condition, provide the first master device with the first access key.
根据第九方面,提供了一种由接收方设备执行以实现认证的方法,所述方法包括:创建所述接收方设备的标识;接收与在发送方设备和所述接收方设备之间建立关系相关的请求;向所述发送方设备至少发送第二主设备的标识;接收与通信条件的确认相关的消息;以及在所述发送方设备满足通信条件的情况下,向所述第二主设备提供第二访问密钥。According to a ninth aspect, there is provided a method performed by a recipient device to achieve authentication, the method comprising: creating an identity of the recipient device; receiving and establishing a relationship between a sender device and the recipient device Related requests; sending at least the identity of the second master device to the sender device; receiving a message related to the confirmation of the communication condition; and when the sender device meets the communication condition, sending the Provide a second access key.
第二、第三、第四、第五、第六、第七、第八和第九方面一般可以具有与第一方面相同的特征和优点。The second, third, fourth, fifth, sixth, seventh, eighth and ninth aspects may generally have the same features and advantages as the first aspect.
第八方面的特征也可以是第二方面的特征。第九方面的特征也可以是第三方面的特征。The features of the eighth aspect may also be the features of the second aspect. The features of the ninth aspect may also be the features of the third aspect.
通过以下详细公开、所附权利要求和附图,本发明所公开的实施例的其他方面、特征和优点将变得显而易见。Other aspects, features and advantages of the disclosed embodiments of the present invention will become apparent from the following detailed disclosure, appended claims and drawings.
一般地,在权利要求中所使用的所有术语应当根据其在技术领域中的普通含义而解释,除非本文中另有明确定义。应当将对“一/一个/该[元件、设备、组件、装置、步骤等等]”的所有引用开放式地解释为指代该元件、设备、组件、装置、步骤等等的至少一个实例,除非另有明确声明。本文公开的任何方法的步骤不必按照所公开的确切顺序而执行,除非明确声明。Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/a/the [element, device, component, means, step, etc.]" should be construed openly as referring to at least one instance of the element, device, component, means, step, etc., Unless expressly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
附图说明 Description of drawings
现在将参照附图来更详细地描述本发明的实施例,附图中:Embodiments of the invention will now be described in more detail with reference to the accompanying drawings, in which:
图1是根据实施例的通信系统的示意图;1 is a schematic diagram of a communication system according to an embodiment;
图2是根据实施例的通信系统的示意图;Figure 2 is a schematic diagram of a communication system according to an embodiment;
图3是根据实施例的通信系统的示意图;Figure 3 is a schematic diagram of a communication system according to an embodiment;
图4是根据实施例的通信系统的示意图;Figure 4 is a schematic diagram of a communication system according to an embodiment;
图5是根据实施例的通信系统的示意图;5 is a schematic diagram of a communication system according to an embodiment;
图6是根据实施例的方法的流程图;Figure 6 is a flowchart of a method according to an embodiment;
具体实施方式 Detailed ways
现在,在下文中将通过示出了本发明的特定实施例的附图来更全面地描述本发明的实施例。然而,可以以很多不同形式来体现本发明,并且不应将本发明理解为限于本文阐述的实施例;而是,提供这些实施例作为示例,使得本公开将是全面和完整的,并将向本领域技术人员全面地传达本发明的范围。此外,在全文中相似的标号指代相似的元件。Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings in which specific embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of illustration so that this disclosure will be thorough and complete, and will convey to Those skilled in the art will fully convey the scope of the present invention. Furthermore, like numerals refer to like elements throughout.
图1示出了示例通信系统100的示意图,在该系统100中,可以应用所公开的实施例。通信系统100包括多个通信设备102、104、106、110、112、114,其可能或可能不能够彼此通信。下面将描述一种方法,其中,第一通信设备102(下文中表示为发送方设备102)希望与第二通信设备104(下文中表示为接收方设备104)建立连接。应当理解,在通信系统100中,通信设备102不限于仅作为发送方设备,备选地,其可以是接收方设备或同时起到发送方设备和接收方设备的作用。类似地,在通信系统100中,通信设备104不限于仅作为接收方设备,备选地,其可以是发送方设备或同时起到接收方设备和发送方设备的作用。即,通信系统100中的任何通信设备可以同时包括发送方和接收方能力。发送方或接收方设备还可以充当第三方设备。下文中将进一步描述第三方设备的功能。然而,应当注意,当要在发送方设备102和接收方设备104之间建立通信时,发送方设备102和接收方设备104都不可以在建立设备102和104之间的通信的过程中充当第三方设备。FIG. 1 shows a schematic diagram of an example communication system 100 in which the disclosed embodiments may be applied. The communication system 100 includes a plurality of communication devices 102, 104, 106, 110, 112, 114, which may or may not be capable of communicating with each other. A method will be described below in which a first communication device 102 (hereinafter denoted sender device 102 ) wishes to establish a connection with a second communication device 104 (hereinafter denoted receiver device 104 ). It should be understood that in the communication system 100, the communication device 102 is not limited to only being a sender device, alternatively, it may be a receiver device or function as both a sender device and a receiver device. Similarly, in the communication system 100, the communication device 104 is not limited to only being a receiver device, alternatively, it may be a sender device or function as both a receiver device and a sender device. That is, any communication device in communication system 100 may include both sender and receiver capabilities. The sender or receiver device can also act as a third party device. The functionality of the third party device is further described below. It should be noted, however, that when communication is to be established between the sender device 102 and the receiver device 104, neither the sender device 102 nor the receiver device 104 may act as a second device in the process of establishing the communication between the devices 102 and 104. Third-party devices.
下面将假定系统100的至少一部分处于操作状态。The following will assume that at least a portion of system 100 is in operation.
当通信设备102、104、106、108、110、112、114与系统100相连时,每一个通信设备102、104、106、108、110、112、114可以创建要在未来通信中使用以标识所述通信设备102、104、106、108、110、112、114的唯一标识或身份。应当注意,由该标识定义的唯一身份可以不被系统100中的任何其他通信设备102、104、106、108、110、112、114所验证。当建立关系(即通信)时,系统100中的其他设备接受该唯一身份。因此,该唯一身份用于匹配目的,并可以不具有控制权威机构。此外,如下文中将解释的,即使系统100中的第二设备拷贝了系统100中的第一设备的唯一身份,或备选地,第一设备的身份与第二设备的身份碰巧相同,这也将不影响在系统100中的两个设备之间建立数字关系的过程。When communication devices 102, 104, 106, 108, 110, 112, 114 are connected to system 100, each communication device 102, 104, 106, 108, 110, 112, 114 may create a The unique identification or identity of the communication device 102, 104, 106, 108, 110, 112, 114. It should be noted that the unique identity defined by this identification may not be verified by any other communication devices 102 , 104 , 106 , 108 , 110 , 112 , 114 in the system 100 . Other devices in system 100 accept this unique identity when establishing a relationship (ie, communicating). Therefore, this unique identity is used for matching purposes and may not have a controlling authority. Furthermore, as will be explained below, even if a second device in system 100 copies the unique identity of a first device in system 100, or alternatively, the identity of the first device happens to be the same as the identity of the second device, this The process of establishing a digital relationship between two devices in system 100 will not be affected.
典型地,这种唯一身份可以采用随机二进制数或整数的序列的形式。序列越长,则生成对于每一个通信设备102、104、106、108、110、112、114来说唯一的序列的概率越高。唯一身份可以备选地或附加地与通信设备102、104、106、108、110、112、114的序号相关联。Typically, this unique identity may take the form of a sequence of random binary numbers or integers. The longer the sequence, the higher the probability of generating a sequence that is unique to each communication device 102 , 104 , 106 , 108 , 110 , 112 , 114 . The unique identity may alternatively or additionally be associated with a serial number of the communication device 102 , 104 , 106 , 108 , 110 , 112 , 114 .
因此,能够与其他通信设备102、104、106、108、110、112、114通信的通信设备102、104、106、108、110、112、114与数字身份相关联。数字身份还可以与引用的号码相关联。数字身份的引用可以与其由他通信设备102、104、106、108、110、112、114关于与所述数字身份相关联的通信设备102、104、106、108、110、112、114而提供的整理(collated)信息相关。下文中将进一步讨论引用。Accordingly, a communication device 102 , 104 , 106 , 108 , 110 , 112 , 114 capable of communicating with other communication devices 102 , 104 , 106 , 108 , 110 , 112 , 114 is associated with a digital identity. Digital identities can also be associated with referenced numbers. A reference to a digital identity may be related to that provided by the other communication device 102, 104, 106, 108, 110, 112, 114 with respect to the communication device 102, 104, 106, 108, 110, 112, 114 associated with said digital identity Collated information is related. References are discussed further below.
在初始步骤中,发送方设备102创建发送方设备102的标识,并且接收方设备104创建接收方设备104的标识。典型地,通信设备102、104、106、108、110、112、114可能仅需要创建标识一次。In an initial step, the sender device 102 creates an identity of the sender device 102 and the recipient device 104 creates an identity of the recipient device 104 . Typically, a communication device 102, 104, 106, 108, 110, 112, 114 may only need to create an identity once.
每一个通信设备102、104、106、108、110、112、114可以通过例如将每一个所建立的通信与序列号相关联,来跟踪每一个所建立的通信。序列号与同其建立了通信的通信设备相关联。Each communication device 102, 104, 106, 108, 110, 112, 114 may track each established communication by, for example, associating each established communication with a serial number. A serial number is associated with a communication device with which communication has been established.
在图1中,两个通信设备102、104、106、108、110、112、114之间的实线116、118、120、122、124、126、128、130表示在实线116、118、120、122、124、126、128、130的每一端处的两个通信设备之间先前已经建立通信。例如,假定如图1中实线130、122、124所示,接收方设备104先前已经与通信设备106、110、112建立通信。如虚线132所示,在发送方设备102和接收方设备104之间将要建立通信。In FIG. 1, solid lines 116, 118, 120, 122, 124, 126, 128, 130 between two communication devices 102, 104, 106, 108, 110, 112, 114 represent Communication between the two communication devices at each end of 120, 122, 124, 126, 128, 130 has previously been established. For example, assume that the recipient device 104 has previously established communication with the communication devices 106 , 110 , 112 as indicated by the solid lines 130 , 122 , 124 in FIG. 1 . As indicated by dashed line 132, communication is about to be established between the sender device 102 and the recipient device 104. As shown in FIG.
进一步假定从接收方设备104到通信设备106、110、112建立通信的相对顺序是按照顺序106、112、110来建立的。即,在建立从接收方设备104到通信设备110的通信之前,并且在建立从接收方设备104到通信设备106的通信之后,建立从接收方设备104到通信设备112的通信。Assume further that the relative order in which communications are established from recipient device 104 to communication devices 106 , 110 , 112 is established in order 106 , 112 , 110 . That is, the communication from recipient device 104 to communication device 112 is established before the communication from recipient device 104 to communication device 110 is established, and after the communication from recipient device 104 to communication device 106 is established.
通信设备的所有序列号可以与序列号列表相关联。优选地,在通信设备中存储该列表。用L104来表示接收方设备104的序列号列表。将如发送方设备104解释的通信设备106的另外的标识信息表示为ID(104,106),并且类似地,ID(104,110)和ID(104,112)分别用于通信设备110和112。All serial numbers of the communication devices may be associated with the list of serial numbers. Preferably, the list is stored in the communication device. Let L104 denote a list of serial numbers of recipient devices 104 . The additional identification information of communication device 106 as explained by sender device 104 is denoted as ID(104, 106), and similarly, ID(104, 110) and ID(104, 112) are used for communication devices 110 and 112 respectively .
从第一通信设备到第二通信设备建立的通信的序列号还可以包括用于表示从第二设备到第一设备建立通信的相对顺序的号码。假定通信设备110以顺序112、104、114来与设备104、112、114建立通信。即,在该示例情形中,从通信设备110到发送方设备104的通信是从通信设备110建立的第二个(2nd)通信。类似地,假定在本示例中,从第三设备106到接收方设备104的通信是从第三设备106建立的第三个(3rd)通信;假定在本示例中,从通信设备112到接收方设备104的通信是从第三设备112建立的第五个(5th)通信。The sequence number of the communication established from the first communication device to the second communication device may also include a number indicating the relative order in which the communication was established from the second device to the first device. Assume that communication device 110 establishes communication with devices 104 , 112 , 114 in order 112 , 104 , 114 . That is, in this example scenario, the communication from communication device 110 to sender device 104 is the second (2nd) communication established from communication device 110 . Similarly, assume that in this example, the communication from third device 106 to recipient device 104 is the third (3rd) communication established from third device 106; assume that in this example, the communication from communication device 112 to recipient The communication of device 104 is the fifth (5th) communication established from the third device 112 .
因此在本示例情形中,接收方设备104的序列号的列表L(104)可以具有以下形式:So in this example scenario, the list L (104) of serial numbers of recipient devices 104 may have the following form:
L(104)=ID(104,106),3L(104) = ID(104, 106), 3
ID(104,112),5ID(104, 112), 5
ID(104,110),2ID(104, 110), 2
因此,使用这种在通信设备102、104、106、108、110、112、114中包括的序列号的列表允许将两个或更多个通信设备102、104、106、108、110、112、114与相同的唯一身份相关联,而在通信系统100中不产生冲突的声明。Thus, using such a list of serial numbers included in a communication device 102, 104, 106, 108, 110, 112, 114 allows two or more communication devices 102, 104, 106, 108, 110, 112, 114 are associated with the same unique identity without creating conflicting claims in communication system 100 .
假定如图1中虚线132所示,发送方设备102希望与接收方设备104建立通信,发送方设备102向所述接收方设备104发送与在发送方设备102和接收方设备104之间建立关系相关的请求。Assume that as shown in dotted line 132 in Figure 1, the sender device 102 wishes to establish communication with the receiver device 104, the sender device 102 sends to the receiver device 104 and establishes a relationship between the sender device 102 and the receiver device 104 related requests.
然后接收方设备104向发送方设备102发送至少第二主设备154的标识。当接收到第二主设备154的标识时,发送方设备102将第二主设备154的标识转发至第一主设备152。The recipient device 104 then sends to the sender device 102 the identification of at least the second master device 154 . When receiving the identity of the second master device 154 , the sender device 102 forwards the identity of the second master device 154 to the first master device 152 .
第一主设备152和第二主设备154可以被视为数字公证人。数字公证人可以是公司、代理或权威机构等,其可以充当数字通信系统和网络中的公证人。由此,数字公证人可以提供被鉴定过的数字证据。下面将进一步公开数字证据。数字证据也可以提供档案和/或功能和/或手段。可能要求由组织来鉴定主设备152和154,见下文。The first master device 152 and the second master device 154 may be considered digital notaries. A digital notary can be a company, agency, or authority, etc., that can act as a notary in digital communication systems and networks. Thus, the digital notary can provide authenticated digital evidence. The digital evidence will be further disclosed below. Digital evidence can also provide archives and/or functions and/or means. Certification of master devices 152 and 154 by the organization may be required, see below.
然后第一主设备152向第二主设备154发送与通信条件相关的请求,其中,为了使发送方设备102与接收方设备104建立通信,需要满足根据第二主设备154的该条件。通信条件可以与可能同安全性问题和标识问题相关的值的集合相关联。例如,标识问题可以涉及在发送方设备102和接收方设备104之间使用的通信策略,如通信协议。应当注意,第一主设备152不需要向第二主设备154通信发送方设备102的身份。Then the first master device 152 sends a request related to the communication condition to the second master device 154 , wherein the condition according to the second master device 154 needs to be satisfied in order for the sender device 102 to establish communication with the receiver device 104 . A communication condition may be associated with a set of values that may be related to security issues and identification issues. For example, the identification issue may relate to a communication strategy, such as a communication protocol, used between the sender device 102 and the recipient device 104 . It should be noted that the first master device 152 need not communicate the identity of the sender device 102 to the second master device 154 .
然后第二主设备154向第一主设备152发送通信条件。在发送方设备102满足通信条件的情况下,第一主设备152可以向第二主设备154确认满足通信条件。类似地,第一主设备152可以将通信条件通信至第二主设备154,其中,为了与发送方设备102建立通信,接收方设备104需要满足该条件。The second master device 154 then sends the communication conditions to the first master device 152 . In the case that the sender device 102 satisfies the communication condition, the first master device 152 may confirm to the second master device 154 that the communication condition is satisfied. Similarly, the first master device 152 may communicate to the second master device 154 a communication condition that the recipient device 104 needs to satisfy in order to establish communication with the sender device 102 .
然后发送方设备102可以向第一主设备152提供第一访问密钥,并且接收方设备104可以向第二主设备154提供第二访问密钥。从而通过使用这种访问密钥,可以实现访问权。The sender device 102 may then provide the first access key to the first master device 152 and the recipient device 104 may provide the second access key to the second master device 154 . Access rights can thus be achieved by using such an access key.
然后可以在第一主设备152和第二主设备154之间实现与发送方设备102和接收方设备104相关的通信。通过使用第一主设备152和第二主设备154,可以实现对发送方设备102和接收方设备104的认证。Communications related to the sender device 102 and the recipient device 104 can then be effected between the first master device 152 and the second master device 154 . By using the first master device 152 and the second master device 154, authentication of the sender device 102 and the receiver device 104 can be achieved.
从发送方设备102发送至接收方设备104的与在发送方设备102和接收方设备104之间建立关系相关的请求可以包括至少第一设备组106、108的标识。第一设备组106、108是发送方设备102先前已经与之建立通信的设备组。在这种情况下,所公开的方法可以继续如下。接收方设备104接收该请求。响应于该请求,接收方设备104分析在第一设备组106、108中包括的设备的身份,并将这些身份与接收方设备先前已经与之建立通信的中间设备组106、110、112相比较。然后接收方设备104向发送方设备102发送至少第二设备组的标识。第二设备组包括:在第一设备组和中间设备组中都包括的设备106。即,第二组包括对于发送方设备和接收方设备来说公共且已知的设备106,或换言之,发送方设备102和接收方设备104先前都已经与之建立连接的设备。即,如果发送方设备102和接收方设备104不具有它们先前都已经与之建立通信的公共通信设备,则第二组可以由空集来表示。然后发送方设备102接收第二组的标识。The request sent from the sender device 102 to the recipient device 104 related to establishing a relationship between the sender device 102 and the recipient device 104 may include an identification of at least the first group of devices 106 , 108 . The first device group 106, 108 is a group of devices with which the sender device 102 has previously established communication. In this case, the disclosed method can continue as follows. Recipient device 104 receives the request. In response to the request, the recipient device 104 analyzes the identities of the devices included in the first device group 106, 108 and compares these identities with the intermediary device groups 106, 110, 112 with which the recipient device has previously established communication. . The recipient device 104 then sends to the sender device 102 an identification of at least the second device group. The second device group includes devices 106 included in both the first device group and the intermediate device group. That is, the second group includes devices 106 that are common and known to both the sender device and the recipient device, or in other words, devices with which both the sender device 102 and the recipient device 104 have previously established a connection. That is, if the sender device 102 and the recipient device 104 do not have a common communication device with which they both have previously established communication, then the second group may be represented by an empty set. The sender device 102 then receives the identification of the second group.
在第一设备组和所述第二设备组中存在至少一个公共设备(下文中表示为第三设备106)的情况下,发送方设备和接收方之间的通信的建立继续如下。发送方设备102从至少一个公共第三设备106请求关于接收方设备104的引用。In case there is at least one common device (hereinafter denoted third device 106 ) in the first device group and said second device group, the establishment of the communication between the sender device and the receiver proceeds as follows. The sender device 102 requests a reference to the recipient device 104 from at least one public third device 106 .
上面已经简要地讨论了引用。引用可以基于散列值。散列值本身是本领域公知的,因此不在本公开中进一步描述。引用还可以基于声明的集合,其中,声明可以与该引用与之相关联的设备的用户的联系人信息(如名称和/或地址)等相关。例如,如果引用与接收方设备104相关联,则该引用可以包括接收方设备104和/或接收方设备104的用户的名称和/或地址。引用可以包括在XML文档中。References have been briefly discussed above. References can be based on hash values. Hash values themselves are well known in the art and are therefore not further described in this disclosure. A reference may also be based on a collection of claims, wherein the claims may be related to, among other things, contact information (eg, name and/or address) of the user of the device to which the reference is associated. For example, if the reference is associated with the recipient device 104, the reference may include the name and/or address of the recipient device 104 and/or the user of the recipient device 104. References can be included in XML documents.
此外,引用可以与发送方和接收方相关联。因此换言之,可以认为引用是(由发送方)向接收方签署的,其中,用于签署该引用的签名从而有利地包括接收方设备的标识。Additionally, references can be associated with senders and receivers. In other words, therefore, the reference can be considered to be signed (by the sender) to the recipient, wherein the signature used to sign the reference thus advantageously comprises the identification of the recipient device.
可选地,当从第一设备向第二设备发送引用时,例如当从接收方设备104向发送方设备102发送引用时,可以对该引用进行加密,这大体上可以提高传输的机密性和安全性,尤其提高引用的传输的机密性和安全性。Optionally, when a reference is sent from a first device to a second device, such as when a reference is sent from recipient device 104 to sender device 102, the reference can be encrypted, which generally improves the confidentiality and privacy of the transmission. Security, especially to improve the confidentiality and security of the transmission of references.
发送方设备102从第三设备106请求对接收方设备104的引用,其中,从第三设备106发送的引用寻址至发送方设备102并与发送方设备102相关联,并且其中,包括该引用的所发送的消息可以由第三设备106加密,使得仅发送方设备102可以对包括该引用的消息部分进行解密。发送方设备102可以例如请求与如第三设备106执行的对接收方设备104的标识相关的信息。The sender device 102 requests a reference to the recipient device 104 from the third device 106, wherein the reference sent from the third device 106 is addressed to and associated with the sender device 102, and wherein the reference includes The sent message of can be encrypted by the third device 106 so that only the sender device 102 can decrypt the portion of the message that includes the reference. The sender device 102 may, for example, request information related to the identification of the recipient device 104 as performed by the third device 106 .
即,第三设备106可以通过比较引用或引用值来执行对接收方设备104的标识。引用值可以是散列值。备选地,引用值可以是序列号。备选地,引用可以是从发送方设备接收的身份信息。引用或引用值可以是散列值、序列号和身份信息的组合。That is, the third device 106 may perform the identification of the recipient device 104 by comparing the references or reference values. The reference value can be a hash value. Alternatively, the reference value may be a serial number. Alternatively, the reference may be identity information received from the sender device. References or reference values can be a combination of hash values, serial numbers, and identity information.
因此可以将第三设备106视为可信的第三部分。与接收方设备104的标识相关的信息可以与接收方设备104和第三设备106之间先前建立的通信相关联。The third device 106 can therefore be considered a trusted third part. Information related to the identification of the recipient device 104 may be associated with a previously established communication between the recipient device 104 and the third device 106 .
当发送方设备102从第三设备106接收到引用时,其中该引用已经从第三设备106经由接收方设备104发送至发送方设备102,则发送方设备102可以通过将引用中包括的信息与同第三设备106相关联的先前存储的信息(例如同发送方设备102和第三设备106之间的先前通信相关联的序列号)进行比较,来检验引用。如果包括引用的消息部分已经由第三设备106加密,则发送方设备102可能首先需要对消息进行解密。When the sender device 102 receives a reference from the third device 106, where the reference has been sent from the third device 106 to the sender device 102 via the recipient device 104, the sender device 102 can combine the information included in the reference with The reference is checked against previously stored information associated with the third device 106, such as a serial number associated with a previous communication between the sender device 102 and the third device 106. If the portion of the message including the reference has been encrypted by the third device 106, the sender device 102 may first need to decrypt the message.
还可以通过在引用中并入地址字段并且在地址字段中添加发送方设备102的身份,将引用与发送方设备102相关联。这增加了过程的安全性,这是因为发送方设备102可以确保向第三设备102传送的信息与发送方设备102相关联,尽管请求是从发送方设备102发送至接收方设备104的,而不是从发送方设备102直接发送至第三设备106的。即,接收方设备104接收到引用请求,然后接收方设备104将该引用请求转发至第三设备106。因此第三设备106从接收方设备104接收到关于接收方设备104的引用请求。然后第三设备106向接收方设备104发送引用。因此接收方设备106接收引用并向发送方设备102发送该引用,发送方设备102接收并检验该引用。The reference may also be associated with the sender device 102 by incorporating an address field in the reference and adding the identity of the sender device 102 in the address field. This increases the security of the process, because the sender device 102 can ensure that the information transmitted to the third device 102 is associated with the sender device 102, even though the request is sent from the sender device 102 to the receiver device 104, while is not sent directly from the sender device 102 to the third device 106 . That is, the recipient device 104 receives the reference request, and the recipient device 104 forwards the reference request to the third device 106 . The third device 106 thus receives a reference request for the recipient device 104 from the recipient device 104 . The third device 106 then sends the reference to the recipient device 104 . The recipient device 106 thus receives the reference and sends the reference to the sender device 102, which receives and verifies the reference.
然后发送方设备102可以创建第一公开加密密钥,用于建立从发送方设备102到接收方设备104的通信。The sender device 102 may then create a first public encryption key for use in establishing communications from the sender device 102 to the recipient device 104 .
然后发送方设备102利用所创建的第一公开加密密钥对所接收的引用进行加密。此外,发送方设备102使用附加公开加密密钥对所创建的第一公开加密密钥进行加密,其中,附加公开加密密钥与在发送方设备102和第三设备106之间先前建立的通信相关联。然后从发送方设备102向接收方设备104发送已加密的第一公开加密密钥和已加密的所接收的引用。因此接收方设备104不了解由发送方设备102创建的第一公开加密密钥。另外,接收方设备104不了解与在发送方设备102和第三设备106之间先前建立的通信相关联的附加公开加密密钥。因此,接收方设备104既不能对已加密的第一公开加密密钥进行解密,也不能对已加密的所接收的引用进行解密。The sender device 102 then encrypts the received reference using the created first public encryption key. Furthermore, the sender device 102 encrypts the created first public encryption key using an additional public encryption key associated with a previously established communication between the sender device 102 and the third device 106 couplet. The encrypted first public encryption key and the encrypted received reference are then sent from the sender device 102 to the recipient device 104 . The recipient device 104 therefore has no knowledge of the first public encryption key created by the sender device 102 . Additionally, the recipient device 104 has no knowledge of additional public encryption keys associated with previously established communications between the sender device 102 and the third device 106 . Accordingly, the recipient device 104 is unable to decrypt neither the encrypted first public encryption key nor the encrypted received reference.
为了使接收方设备104验证与已加密的引用中包括的在接收方设备104和第三设备106之间先前建立的通信相关的信息,接收方设备104将已加密的第一公开加密密钥转发至第三设备106。从接收方设备104发送至第三设备106的该消息还包括与对已加密的第一公开加密密钥进行解密相关的请求。由于已经利用如上所述与在发送方设备102和第三设备106之间先前建立的通信相关联的附加公开加密密钥对第一公开加密密钥进行加密,因此第三设备106能够对已加密的第一公开加密密钥进行解密。然后可以从第三设备106向接收方设备104发送回已解密的第一公开加密密钥。为了增加安全性,第三设备106可以使用其他公开加密密钥,使用附加公开加密密钥对已解密的第一公开加密密钥进行加密,其中,该附加公开加密密钥与在第三设备106和接收方设备104之间先前建立的通信相关联。In order for the recipient device 104 to verify the information related to the previously established communication between the recipient device 104 and the third device 106 included in the encrypted reference, the recipient device 104 forwards the encrypted first public encryption key to to the third device 106 . The message sent from the recipient device 104 to the third device 106 also includes a request related to decrypting the encrypted first public encryption key. Since the first public encryption key has been encrypted with the additional public encryption key associated with the previously established communication between the sender device 102 and the third device 106 as described above, the third device 106 is able to encrypt the encrypted The first public encryption key for decryption. The decrypted first public encryption key may then be sent back from the third device 106 to the recipient device 104 . For increased security, the third device 106 may encrypt the decrypted first public encryption key with an additional public encryption key using other public encryption keys, wherein the additional public encryption key is identical to the is associated with a previously established communication between the recipient device 104.
由于接收方设备104了解已用于对第一公开加密密钥进行加密的该其他公开加密密钥,因此接收方设备104可以在接收之后对所接收的已加密的第一公开加密密钥进行解密。Since the recipient device 104 knows the other public encryption key that was used to encrypt the first public encryption key, the recipient device 104 can decrypt the received encrypted first public encryption key after receiving .
因此,使用已解密的第一公开加密密钥,接收方设备104可以对与在接收方设备104和第三设备106之间先前建立的通信相关的先前接收的已加密的引用进行解密。然后接收方设备104可以验证该引用的内容。即,通过将引用中包括的信息与接收方设备104中包括的信息(例如序列号)进行比较,接收方设备104能够检验引用中包括的信息是正确的并确实与在接收方设备104和第三设备106之间先前建立的通信相关。Thus, using the decrypted first public encryption key, the recipient device 104 can decrypt previously received encrypted references related to previously established communications between the recipient device 104 and the third device 106 . The recipient device 104 can then verify the content of the reference. That is, by comparing the information included in the reference with the information included in the recipient device 104 (e.g., a serial number), the recipient device 104 can verify that the information included in the reference is correct and indeed consistent with the A previously established communication between the three devices 106 is related.
如果引用包括散列值(如上所述),则接收方设备104可以计算第一公开加密密钥的散列值。然后接收方设备104可以将该计算出的散列值和在引用中包括的散列值进行比较,以检验在从第三设备106经由接收方设备104发送到发送方设备102的传输期间,或从第三设备106到接收方设备104的传输期间未对引用进行改动。If the reference includes a hash value (as described above), recipient device 104 may calculate a hash value of the first public encryption key. The recipient device 104 may then compare this calculated hash value to the hash value included in the reference to verify that during transmission from the third device 106 to the sender device 102 via the recipient device 104, or The reference is not altered during transmission from the third device 106 to the recipient device 104 .
可以认为,发送方设备102和接收方设备104之间已建立的通信定义了数字契约。从而,数字契约可以与两个或更多个通信设备102、104、106、108、110、112、114之间的数字关系相关,其中,契约可以包括与数字签名和/或数字证据相关的信息(如下文中进一步公开的)。当通信设备102、104、106、108、110、112、114与其他通信设备102、104、106、108、110、112、114进行交互或通信时,可以使用由此创建的数字契约来标识通信设备102、104、106、108、110、112、114。数字契约可以用于认证、访问权和/或签名的目的。因此数字契约可以用于检索引用。It can be considered that the established communication between the sender device 102 and the recipient device 104 defines a digital contract. Thus, a digital contract may relate to a digital relationship between two or more communication devices 102, 104, 106, 108, 110, 112, 114, wherein the contract may include information related to digital signatures and/or digital evidence (as further disclosed below). When a communication device 102, 104, 106, 108, 110, 112, 114 interacts or communicates with other communication devices 102, 104, 106, 108, 110, 112, 114, the digital contract thus created may be used to identify the communication Devices 102, 104, 106, 108, 110, 112, 114. Digital contracts can be used for authentication, access rights and/or signature purposes. Thus digital contracts can be used to retrieve references.
图2示出了本发明可适用的通信系统200的示意图。如图1的通信系统100中那样,通信系统200包括多个通信设备102、104、202、204、206、208、210,其可能或可能不能彼此通信。FIG. 2 shows a schematic diagram of a communication system 200 to which the present invention is applicable. As in communication system 100 of FIG. 1 , communication system 200 includes a plurality of communication devices 102, 104, 202, 204, 206, 208, 210, which may or may not be in communication with each other.
下面将假定系统200处于操作状态,并且如虚线224所示,将要在发送方设备102和接收方设备104之间建立通信。It will be assumed below that the system 200 is in operation and that communication is to be established between the sender device 102 and the receiver device 104 as indicated by dashed line 224 .
如上面参照图1的通信系统100公开的方法那样,在通信系统200中,第一设备102(表示为发送方设备)希望与第二设备104(表示为接收方设备)建立通信。在图2的示例情形中,发送方设备102与通信设备202和208相关联。即,如实线212和218所示,发送方设备102先前已经与通信设备202和208建立通信。类似地,如实线216和222所示,接收方设备先前已经与通信设备204、206和210建立通信。As in the method disclosed above with reference to the communication system 100 of FIG. 1 , in the communication system 200 a first device 102 (denoted as a sender device) wishes to establish communication with a second device 104 (denoted as a receiver device). In the example scenario of FIG. 2 , sender device 102 is associated with communication devices 202 and 208 . That is, as shown by solid lines 212 and 218 , sender device 102 has previously established communication with communication devices 202 and 208 . Similarly, the recipient device has previously established communication with communication devices 204 , 206 , and 210 as shown by solid lines 216 and 222 .
因此可以得出结论,根据该情形,发送方设备102和接收方设备104未共享公共通信设备。以以上参照图1阐述的语言,第二组可以由空集来表示。然而,假定发送方设备102与第四设备202相关联。此外,接收方设备104与第五设备204相关联。此外,如实线214所示,第四设备202与第五设备204相关联。进一步参见下面与图3相关联的描述。It can therefore be concluded that, according to the circumstances, the sender device 102 and the receiver device 104 do not share a common communication device. In the language set forth above with reference to FIG. 1 , the second group can be represented by the empty set. However, assume that the sender device 102 is associated with the fourth device 202 . Furthermore, the recipient device 104 is associated with a fifth device 204 . Additionally, as shown by solid line 214 , fourth device 202 is associated with fifth device 204 . See further below the description associated with FIG. 3 .
其中,在第一设备组和第二设备组中不存在至少一个公共第三设备的情况下,在发送方设备和接收方之间的通信的建立可以继续如下。Wherein, in the absence of at least one common third device in the first device group and the second device group, the establishment of the communication between the sender device and the receiver may proceed as follows.
发送方设备102发送至少包括与第四设备202相关联的至少一个子组的标识在内的请求,发送方设备102与该子组相关联。该请求由接收方设备104接收。接收方设备104分析在请求中包括的至少一个子组的标识,并将该标识与包括同接收方设备104相关联的至少一个子组在内的列表进行比较。The sender device 102 sends a request including at least an identification of at least one subgroup associated with the fourth device 202 with which the sender device 102 is associated. The request is received by recipient device 104 . The recipient device 104 analyzes the identification of the at least one subgroup included in the request and compares the identification to a list including the at least one subgroup associated with the recipient device 104 .
在找到至少一个公共子组的情况下,接收方设备104向发送方设备102发送至少与第五设备204相关联的至少一个公共子组的标识。因此,该至少一个公共子组同时与发送方设备102和接收方设备104相关联。从而可以认为,发送方设备102可以经由第四设备202和第五设备204与接收方设备104相关联。In case at least one common subgroup is found, the recipient device 104 sends to the sender device 102 an identification of at least one common subgroup associated with at least the fifth device 204 . Thus, the at least one common subgroup is associated with both the sender device 102 and the recipient device 104 . It can thus be considered that the sender device 102 can be associated with the receiver device 104 via the fourth device 202 and the fifth device 204 .
然后由发送方设备102接收该至少一个公共子组的标识。然后发送方设备102向接收方设备104发送消息,其中,发送方设备102从第五设备204请求关于所述接收方104的引用。该消息还包括该引用要由第四设备202验证的信息。由接收方设备104将该请求转发至第五设备204。在接收之后,第五设备204向接收方设备104发送该引用,并且接收方设备104向发送方设备转发该引用。The identification of the at least one common subgroup is then received by the sender device 102 . The sender device 102 then sends a message to the recipient device 104 , wherein the sender device 102 requests a reference about said recipient 104 from the fifth device 204 . The message also includes information that the reference is to be verified by the fourth device 202 . The request is forwarded by the recipient device 104 to the fifth device 204 . After receipt, the fifth device 204 sends the reference to the recipient device 104, and the recipient device 104 forwards the reference to the sender device.
然而,由于可以假定尚未在发送方设备104和第五设备204之间建立通信(否则,发送方设备102和接收方设备104应当使第五设备204作为公共设备),因此发送方设备102可能不能验证所接收的引用。因此,发送方设备102向第四设备202发送所接收的引用以进行验证,其中,从发送方设备102发送到接收方设备202的消息还可以包括与引用的来源相关的信息。对于本情况,引用的来源是第五设备204。在接收到并验证了引用之后,第四设备202向发送方设备102发送验证过的引用。从第四设备202到发送方设备102的消息还可以包括与引用的来源相关的验证信息。即,对于本情况,与引用的来源相关的验证信息公开第五设备204作为来源。However, since it can be assumed that communication between the sender device 104 and the fifth device 204 has not been established (otherwise, the sender device 102 and the receiver device 104 should have the fifth device 204 as a public device), the sender device 102 may not be able to Validate received referrals. Accordingly, the sender device 102 sends the received reference to the fourth device 202 for verification, wherein the message sent from the sender device 102 to the recipient device 202 may also include information about the source of the reference. For the present case, the source cited is the fifth device 204 . After receiving and verifying the reference, the fourth device 202 sends the verified reference to the sender device 102 . The message from the fourth device 202 to the sender device 102 may also include authentication information related to the source of the reference. That is, for the present case, the verification information related to the referenced source discloses the fifth device 204 as the source.
然后发送方设备102可以创建第一公开加密密钥,用于建立从发送方设备102到接收方设备104的通信。The sender device 102 may then create a first public encryption key for use in establishing communications from the sender device 102 to the recipient device 104 .
然后发送方设备102利用所创建的第一公开加密密钥对所接收的引用进行加密。此外,发送方设备102使用附加公开加密密钥对所创建的第一公开加密密钥进行加密,其中,附加公开加密密钥与在发送方设备102和第四设备202之间先前建立的通信相关联。然后从发送方设备102向接收方设备104发送已加密的第一公开加密密钥和已加密的所接收的引用。因此,接收方设备104不了解由发送方设备102创建的第一公开加密密钥。另外,接收方设备104不了解与在发送方设备102和第四设备202之间先前建立的通信相关联的附加公开加密密钥。因此,接收方设备102既不能对已加密的第一公开加密密钥进行解密,也不能对已加密的所接收的引用进行解密。The sender device 102 then encrypts the received reference using the created first public encryption key. Furthermore, the sender device 102 encrypts the created first public encryption key using an additional public encryption key, wherein the additional public encryption key is associated with a previously established communication between the sender device 102 and the fourth device 202 couplet. The encrypted first public encryption key and the encrypted received reference are then sent from the sender device 102 to the recipient device 104 . Accordingly, the recipient device 104 has no knowledge of the first public encryption key created by the sender device 102 . Additionally, the recipient device 104 has no knowledge of additional public encryption keys associated with previously established communications between the sender device 102 and the fourth device 202 . Accordingly, the recipient device 102 is unable to decrypt neither the encrypted first public encryption key nor the encrypted received reference.
为了使接收方设备104验证与已加密的引用中包括的在接收方设备104和第五设备204之间先前建立的通信相关的信息,接收方设备104将已加密的第一公开加密密钥转发至第五设备204。从接收方设备104发送至第五设备204的该消息还包括与对已加密的第一公开加密密钥进行解密相关的请求。In order for the recipient device 104 to verify the information related to the previously established communication between the recipient device 104 and the fifth device 204 included in the encrypted reference, the recipient device 104 forwards the encrypted first public encryption key to to the fifth device 204 . The message sent from the recipient device 104 to the fifth device 204 also includes a request related to decrypting the encrypted first public encryption key.
由于已经利用如上所述与在发送方设备102和第四设备202之间先前建立的通信相关联的附加公开加密密钥对第一公开加密密钥进行加密,因此第五设备204不能对已加密的第一公开加密密钥进行解密。因此,为了对已加密的第一公开加密密钥进行解密,第五设备204将该请求转发至第四设备202,因此第四设备202能够对已加密的第一公开加密密钥进行解密。然后可以从第四设备202经由第五设备204向接收方设备104发送回已解密的第一公开加密密钥。为了增加安全性,第四设备202和第五设备204可以使用其他公开加密密钥对已解密的第一公开加密密钥进行加密。在从第四设备202到第五设备204的传输期间和在从第五设备204到接收方设备104的传输期间,使用分离的加密密钥。Since the first public encryption key has been encrypted with the additional public encryption key associated with the previously established communication between the sender device 102 and the fourth device 202 as described above, the fifth device 204 cannot encrypt the encrypted The first public encryption key for decryption. Therefore, in order to decrypt the encrypted first public encryption key, the fifth device 204 forwards the request to the fourth device 202, so that the fourth device 202 is able to decrypt the encrypted first public encryption key. The decrypted first public encryption key may then be sent back from the fourth device 202 to the recipient device 104 via the fifth device 204 . For increased security, the fourth device 202 and the fifth device 204 may use other public encryption keys to encrypt the decrypted first public encryption key. During the transmission from the fourth device 202 to the fifth device 204 and during the transmission from the fifth device 204 to the recipient device 104, separate encryption keys are used.
因此,使用已解密的第一公开加密密钥,接收方设备104可以对与在接收方设备104和第五设备204之间先前建立的通信相关的先前接收的已加密的引用进行解密。然后接收方设备104可以验证该引用的内容。即,通过将引用中包括的信息与接收方设备104中包括的信息(例如序列号)进行比较,接收方设备104能够检验引用中包括的信息是正确的并确实与在接收方设备104和第五设备204之间先前建立的通信相关。Thus, using the decrypted first public encryption key, the recipient device 104 can decrypt previously received encrypted references related to previously established communications between the recipient device 104 and the fifth device 204 . The recipient device 104 can then verify the content of the reference. That is, by comparing the information included in the reference with the information included in the recipient device 104 (e.g., a serial number), the recipient device 104 can verify that the information included in the reference is correct and indeed consistent with the A previously established communication between the five devices 204 is related.
如果引用包括散列值(如上所述),则接收方设备104可以计算第一公开加密密钥的散列值。然后接收方设备104可以在该计算出的散列值和在引用中包括的散列值之间进行比较,以检验在传输期间未改动过引用。If the reference includes a hash value (as described above), recipient device 104 may calculate a hash value of the first public encryption key. The recipient device 104 may then perform a comparison between this calculated hash value and the hash value included in the reference to verify that the reference has not been altered during transmission.
在不存在对于发送方设备102和接收方设备104来说公共的子组的情况下,接收方设备104可以向发送方设备102发送用于指示没有找到公共子组的消息。接收方设备104还可以请求发送方设备102发送至少包括与发送方设备102相关联的至少一个子组的标识在内的新请求,并且该标识先前未从发送方设备102发送至接收方设备104。然后接收方设备104接收该新请求,并如上所述分析标识。概述的过程可以继续,直到发现公共子组为止。备选地,如果找不到公共子组,则可以终止在发送方设备102和接收方设备104之间建立通信的过程。备选地,如果找不到公共子组,则发送方设备102和接收方设备104可以如下所述搜索与更高的分级级别相关联的公共设备。In the event that there is no subgroup common to the sender device 102 and the recipient device 104, the recipient device 104 may send a message to the sender device 102 indicating that no common subgroup was found. The recipient device 104 may also request the sender device 102 to send a new request including at least an identification of at least one subgroup associated with the sender device 102, and which identification was not previously sent from the sender device 102 to the recipient device 104 . The recipient device 104 then receives the new request and analyzes the identification as described above. The outlined process can continue until a common subgroup is found. Alternatively, the process of establishing communication between the sender device 102 and the recipient device 104 may be terminated if no common subgroup is found. Alternatively, if no common subgroup is found, the sender device 102 and recipient device 104 may search for common devices associated with higher hierarchical levels as described below.
图3示出了通信系统300的示例,在通信系统300中,如实线308和310所示,先前已经在第四设备202与设备102和302之间分别建立通信,并且其中,如实线318、314和316所示,已经在第五设备204与设备104、304和306之间分别建立通信。此外,如虚线320所示,发送方设备102和接收方设备104将要建立通信。因此,可以认为,设备102、202和302表示通信系统300的第一子组,而可以认为,设备104、204、304和306表示通信系统300的第二子组。还可以认为,这些子组表示不同的类别。FIG. 3 shows an example of a communication system 300 in which communication has previously been established between the fourth device 202 and devices 102 and 302, as shown by solid lines 308 and 310, respectively, and wherein, as shown by solid lines 318, As indicated by 314 and 316, communications have been established between the fifth device 204 and the devices 104, 304, and 306, respectively. Additionally, as indicated by dashed line 320, the sender device 102 and the recipient device 104 are about to establish communication. Accordingly, devices 102 , 202 , and 302 can be considered to represent a first subset of communication systems 300 , while devices 104 , 204 , 304 , and 306 can be considered to represent a second subset of communication systems 300 . It can also be considered that these subgroups represent different categories.
子组可以例如表示不同的地理位置,例如不同的国家或其部分。因此,在这种情况下,第四设备202和第五设备204可以例如表示或代表分别与第四设备202和第五设备204相关联的相应国家的不同政府机构。例如,第四设备202可以在地理上位于第一国家中,而第五设备204可以在地理上位于与所述第一国家不同的第二国家中。合适的政府机构的示例可以包括负责处理标识信息的代理处,例如国家身份登记处。由此,可以认为,第四设备202和第五设备204表示所谓的可信第三方。Subgroups may eg represent different geographic locations, eg different countries or parts thereof. Thus, in this case, the fourth device 202 and the fifth device 204 may, for example, represent or represent different government agencies of the respective countries associated with the fourth device 202 and the fifth device 204, respectively. For example, the fourth device 202 may be geographically located in a first country and the fifth device 204 may be geographically located in a second country different from the first country. Examples of suitable government agencies may include agencies responsible for handling identification information, such as the National Identity Registry. Thus, it can be considered that the fourth device 202 and the fifth device 204 represent so-called trusted third parties.
不同国家中的政府机构可以与组织(例如全球信任中心)相关联,该组织可以强制执行或建议通信设备为了能够彼此建立通信而应当满足的通信条件。因此,该组织可以将这些通信条件通信至以上公开的主设备。此外,可以要求该组织鉴定主设备。Government agencies in different countries may be associated with organizations, such as a global trust center, which may enforce or recommend communication conditions that communication devices should meet in order to be able to establish communication with each other. Thus, the organization can communicate these communication conditions to the master device disclosed above. Additionally, the organization may be required to authenticate the master device.
在通信系统300与合股公司相关联的情况下,不同的子组可以表示该合股公司中的不同部门或分部。因此,在这种情况下,第四设备202和第五设备204(如实线312所示,它们相关联)可以例如表示与分别同第四设备202和第五设备204相关联的每一个部门或分部相关联的不同数据服务中心。其他示例包括但不限于不同的互联网服务提供商、互联网社区、银行会员、俱乐部会员等等。一般要求和/或协定:发送方设备102和接收方设备104信任提供和/或负责互联网服务、互联网社区、银行会员或俱乐部会员的权威机构、代理处、公司等(由第四设备202和第五设备204表示)。再一次,可以认为,第四设备202和第五设备204表示所谓的可信第三方。本领域技术人员将理解,这些仅是本发明可适用的几个示例。Where communication system 300 is associated with a joint stock company, different subgroups may represent different departments or divisions within the joint stock company. Thus, in this case, the fourth device 202 and the fifth device 204 (which are associated as shown by the solid line 312) may, for example, represent each department or department associated with the fourth device 202 and the fifth device 204 respectively. Different data service centers associated with branches. Other examples include, but are not limited to, different internet service providers, internet communities, bank memberships, club memberships, etc. General requirements and/or agreements: The sender device 102 and the receiver device 104 trust the authority, agency, company, etc. (by the fourth device 202 and the five devices 204). Again, it can be considered that the fourth device 202 and the fifth device 204 represent so-called trusted third parties. Those skilled in the art will appreciate that these are just a few examples to which the present invention is applicable.
一般而言,因此可以假定每一个子组中的至少一个设备(这里,分别由第一子组中的第四设备202和第二子组中的第五设备204来例证)已经与另一个子组中的设备建立通信。此外,在一些情况下,可以假定子组设备之一(例如,分别是第一子组中的第四设备202和第二子组中的第五设备204)可以充当可负责向子组中每一个设备发放会员资格的政府机构。In general, it can thus be assumed that at least one device in each subgroup (here, exemplified by the fourth device 202 in the first subgroup and the fifth device 204 in the second subgroup, respectively) has communicated with another subgroup. The devices in the group establish communication. Furthermore, in some cases, it may be assumed that one of the subgroup devices (eg, the fourth device 202 in the first subgroup and the fifth device 204 in the second subgroup, respectively) may act as responsible for providing A government agency that issues membership to a device.
另外,通信设备可以与多个不同的子组相关联,其中每一个关联的子组与不同的应用相关。例如,一方面,通信设备可以与银行会员相关联,另一方面,通信设备可以同时与互联网社区相关联。Additionally, a communication device may be associated with a plurality of different subgroups, where each associated subgroup is associated with a different application. For example, on the one hand, a communication device can be associated with a bank member, and on the other hand, a communication device can be associated with an Internet community at the same time.
图4示出了本发明可适用的与图3的通信系统300类似的通信系统400的示意图。如图3中那样,如点划线422所示,发送方设备102希望与接收方设备104建立通信,其中,如实线所示,发送方设备102经由第四设备202与第一子组相关联,并且接收方设备104经由第五设备204与第二子组相关联。根据如图4中公开的情形,第一子组包括设备102、202和412,而第二子组包括设备104、204和420。参考上述内容,第一和第二子组可以表示不同的国家。例如,第一子组可以表示第一国家中的设备,第二子组可以表示第二国家中的设备。那么,第四设备202和第五设备204可以充当政府机构。FIG. 4 shows a schematic diagram of a communication system 400 similar to the communication system 300 of FIG. 3 to which the present invention is applicable. As in FIG. 3 , the sender device 102 wishes to establish communication with the recipient device 104 as indicated by the dotted line 422 , wherein the sender device 102 is associated with the first subgroup via the fourth device 202 as indicated by the solid line , and the recipient device 104 is associated with the second subset via the fifth device 204 . According to the scenario disclosed in FIG. 4 , the first subgroup includes devices 102 , 202 and 412 , while the second subgroup includes devices 104 , 204 and 420 . Referring to the above, the first and second subgroups may represent different countries. For example, a first subgroup may represent devices in a first country and a second subgroup may represent devices in a second country. The fourth device 202 and the fifth device 204 may then act as government agencies.
在本示例中,如虚线所示,发送方设备102还与包括设备102、406、408和410在内的第三子组相关联,并且,如点线所示,发送方设备102还与包括设备102、414、416和418在内的第四子组相关联。例如,第三子组可以表示与相同银行相关联的设备,而第四子组可以表示与相同互联网服务提供商相关联的设备。In this example, sender device 102 is also associated with a third subgroup including devices 102, 406, 408, and 410, as indicated by the dashed line, and, as indicated by the dotted line, is also associated with A fourth subgroup including devices 102, 414, 416, and 418 is associated. For example, a third subgroup may represent devices associated with the same bank, while a fourth subgroup may represent devices associated with the same Internet service provider.
图5示出了本发明可适用的与图1的通信系统100类似的通信系统500的示意图。如图1的通信系统100中那样,通信系统200包括多个通信设备102、104、106、108、110、112、114、502、504,其可能或可能不能彼此通信。FIG. 5 shows a schematic diagram of a communication system 500 similar to the communication system 100 of FIG. 1 to which the present invention is applicable. As in communication system 100 of FIG. 1 , communication system 200 includes a plurality of communication devices 102, 104, 106, 108, 110, 112, 114, 502, 504, which may or may not be in communication with each other.
下面将假定系统500处于操作状态。The following will assume that the system 500 is in an operational state.
如以上参照图1的通信系统100公开的方法那样,在通信系统500中,第一设备102(表示为发送方设备)希望与第二设备104(表示为接收方设备)建立通信。如图1中那样,两个通信设备102、104、106、108、110、112、114、502、504之间的实线510、512、514、516、518、520、522、524、526表示实线510、512、514、516、518、520、522、524、526的每一端处的两个通信设备之间先前已经建立通信。即,如图500的示例情形中那样,先前已经例如在发送方设备102和第三设备106之间、在发送方设备102和第一辅助设备502之间、在接收方设备104和第三设备106之间、以及在接收方设备104和第二辅助设备504之间建立通信。如虚线528所示,将要在发送方设备102和接收方设备104之间建立通信。As in the method disclosed above with reference to the communication system 100 of FIG. 1 , in the communication system 500 a first device 102 (denoted as a sender device) wishes to establish communication with a second device 104 (denoted as a receiver device). As in FIG. 1 , solid lines 510 , 512 , 514 , 516 , 518 , 520 , 522 , 524 , 526 between two communication devices 102 , 104 , 106 , 108 , 110 , 112 , 114 , 502 , 504 represent Communication between the two communication devices at each end of the solid lines 510, 512, 514, 516, 518, 520, 522, 524, 526 has previously been established. That is, as in the example situation of diagram 500, there have been previously Communication is established between 106 , and between recipient device 104 and second auxiliary device 504 . As indicated by dashed line 528, communication is to be established between sender device 102 and recipient device 104. Referring now to FIG.
可以认为,第一和第二辅助设备502和504分别表示发送方设备102和接收方设备104的数字证据。即,可以要求由第一辅助设备502来监视涉及发送方设备102而建立的所有关系。因此,更一般地,可以要求由辅助设备来监视所有关系;第一辅助设备502监视发送方设备102的操作和/或由发送方设备102发送和接收的消息,而第二辅助设备504监视接收方设备102的操作和/或由接收方设备102发送和接收的消息。因此可以认为,第一和第二辅助设备502、504的监视过程涉及采集消息交易信息,例如消息的发送方和/或接收方。第一和第二辅助设备502、504的监视过程还可以包括向所发送的消息提供时间戳和/或数字签名。时间戳和数字签名本身是本领域公知的,因此在本公开中将不进一步讨论。当在发送方设备102和接收方设备104之间建立通信时,还可以要求发送方设备102的第一辅助设备502和接收方设备204的第二辅助设备504建立通信。It can be considered that the first and second secondary devices 502 and 504 represent digital evidence for the sender device 102 and the recipient device 104, respectively. That is, all relationships established involving the sender device 102 may be required to be monitored by the first secondary device 502 . Thus, more generally, all relationships may be required to be monitored by secondary devices; the first secondary device 502 monitors the operation of the sender device 102 and/or the messages sent and received by the sender device 102, while the second secondary device 504 monitors the received operation of the party device 102 and/or messages sent and received by the recipient device 102. It can thus be considered that the monitoring process of the first and second secondary devices 502, 504 involves collecting message transaction information, such as the sender and/or recipient of the message. The monitoring process of the first and second secondary devices 502, 504 may also include providing time stamps and/or digital signatures to sent messages. Timestamps and digital signatures per se are well known in the art and therefore will not be discussed further in this disclosure. When establishing communication between the sender device 102 and the recipient device 104, the first accessory 502 of the sender device 102 and the second accessory 504 of the recipient device 204 may also be required to establish communication.
接下来,参照图5的通信系统500,将公开对在发送方设备102和接收方设备104之间建立的通信进行终止的过程。然而,在已作必要修正的情况下,该过程也适用于图1-4的通信系统100、200、300和400。Next, referring to the communication system 500 of FIG. 5 , a process for terminating a communication established between the sender device 102 and the receiver device 104 will be disclosed. However, the process also applies mutatis mutandis to the communication systems 100, 200, 300 and 400 of FIGS. 1-4.
首先,应当理解,在第一辅助设备502监视发送方设备102的操作和/或由发送方设备102发送和接收的消息的情况下,发送方设备102发送的消息包括两个数字签名;一个数字签名与发送方设备102相关联,一个数字签名与第一辅助设备502相关联。At the outset, it should be understood that where the first secondary device 502 monitors the operation of the sender device 102 and/or the messages sent and received by the sender device 102, the messages sent by the sender device 102 include two digital signatures; A signature is associated with the sender device 102 and a digital signature is associated with the first secondary device 502 .
因此,在第一辅助设备502监视由发送方设备102建立的所有通信关系的情况下,发送方设备102可以通过向第一辅助设备502发送消息,来终止在发送方设备102和接收方设备104之间建立的通信,其中,该消息包括用于声明第一辅助设备502不应将数字签名插入被监视的消息中的信息。即,在这种情况下,发送方设备102发送的消息包括一个数字签名,该数字签名与发送方设备102相关联。如果接收方设备104接收到不包括第一辅助设备502的数字签名在内的消息,则接收方设备502可以选择将所接收的消息归类为不完整的,从而可以进一步忽略其内容。由于接收方设备104忽略了所接收的消息的内容,因此可以认为,已经终止从发送方设备102到接收方设备104建立的通信和/或在发送方设备102和接收方设备104之间建立的通信。备选地,接收方设备104可以向发送方设备102发送消息,该消息用于声明:由于所接收的消息未包括第一辅助设备502的数字签名,因此所接收的消息被解释为不完整的。Thus, with the first secondary device 502 monitoring all communication relationships established by the sender device 102, the sender device 102 can terminate the connection between the sender device 102 and the receiver device 104 by sending a message to the first secondary device 502. A communication established between , wherein the message includes information for declaring that the first auxiliary device 502 should not insert a digital signature into the monitored message. That is, in this case, the message sent by the sender device 102 includes a digital signature that is associated with the sender device 102 . If the recipient device 104 receives a message that does not include the digital signature of the first auxiliary device 502, the recipient device 502 may choose to classify the received message as incomplete so that its content may be further ignored. Since the recipient device 104 ignored the content of the received message, it may be assumed that the communication established from the sender device 102 to the recipient device 104 and/or the communication established between the sender device 102 and the recipient device 104 has been terminated. communication. Alternatively, the recipient device 104 may send a message to the sender device 102 stating that the received message was interpreted as incomplete because it did not include the digital signature of the first secondary device 502 .
还可以在流程图中示出一种在通信系统100、200、300、400、500中用于认证发送方设备102和接收方设备104的方法,其中,以上参照图1-5已经公开了该方法。因此,这种方法可以被总结为包括:在步骤602,由发送方设备102创建发送方设备102的标识;在步骤604,由接收方设备104创建接收方设备104的标识;在步骤606,由发送方设备102向接收方设备104发送与在发送方设备102和接收方设备之间建立关系相关的请求;在步骤608,由接收方设备104向发送方设备102发送至少第二主设备154的标识;在步骤610,由发送方设备102向第一主设备152发送第二主设备154的标识;在步骤612,从第一主设备152向第二主设备154发送与发送方设备102为了与接收方设备104建立通信所需的通信条件相关的请求;在步骤614,从第二主设备154向第一主设备152发送通信条件;在步骤616,如果确定了发送方设备102满足通信条件,则在步骤618,由发送方设备102向第一主设备152提供第一访问密钥;以及在步骤620,由接收方设备104向第二主设备154提供第二访问密钥。A method for authenticating a sender device 102 and a receiver device 104 in a communication system 100, 200, 300, 400, 500, which has been disclosed above with reference to FIGS. method. Therefore, this method can be summarized as comprising: at step 602, the identification of the sending device 102 is created by the sending device 102; at step 604, the identification of the receiving device 104 is created by the receiving device 104; The sender device 102 sends to the receiver device 104 a request related to establishing a relationship between the sender device 102 and the receiver device; at step 608, the receiver device 104 sends to the sender device 102 the information of at least the second master device 154 identification; in step 610, the identification of the second master device 154 is sent by the sender device 102 to the first master device 152; The receiver device 104 establishes a request related to the communication conditions required for communication; in step 614, the communication condition is sent from the second master device 154 to the first master device 152; in step 616, if it is determined that the sender device 102 meets the communication condition, Then at step 618 , the sender device 102 provides the first access key to the first master device 152 ; and at step 620 , the receiver device 104 provides the second access key to the second master device 154 .
应当注意,已经公开了用于建立从发送方设备102到接收方设备104的通信的系统和方法。然而,本领域技术人员将理解,由于如上所述,发送方设备也可以包括接收方设备104的功能,并且反之亦然,因此可以以相同方式来建立从接收方设备104到发送方设备102的通信。因此,发送方设备102可以互换地充当接收方设备104,并且反之亦然。因此可以认为,上述系统和方法可以适用于在发送方设备102和接收方设备104之间建立通信。It should be noted that systems and methods for establishing communication from the sender device 102 to the recipient device 104 have been disclosed. However, those skilled in the art will understand that since, as described above, the sender device may also include the functionality of the receiver device 104, and vice versa, the communication from the receiver device 104 to the sender device 102 may be established in the same manner. communication. Accordingly, the sender device 102 may interchangeably act as the recipient device 104, and vice versa. It can therefore be considered that the systems and methods described above can be adapted to establish communications between the sender device 102 and the receiver device 104 .
以上,已经参照几个实施例主要描述了本发明。然而,本领域技术人员容易理解,在由所附专利权利要求定义的本发明范围内,除以上公开的实施例之外的实施例也同样可能。Above, the present invention has been mainly described with reference to a few embodiments. However, as is readily appreciated by a person skilled in the art, other embodiments than the ones disclosed above are equally possible within the scope of the invention, as defined by the appended patent claims.
Claims (16)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/EP2008/058681 WO2010000329A1 (en) | 2008-07-04 | 2008-07-04 | Secure digital communications |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102077542A CN102077542A (en) | 2011-05-25 |
| CN102077542B true CN102077542B (en) | 2014-12-10 |
Family
ID=40445387
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN200880130137.1A Expired - Fee Related CN102077542B (en) | 2008-07-04 | 2008-07-04 | Secure digital communications |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US8782406B2 (en) |
| EP (1) | EP2301219A1 (en) |
| CN (1) | CN102077542B (en) |
| WO (1) | WO2010000329A1 (en) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9603171B2 (en) * | 2009-12-10 | 2017-03-21 | Apple Inc. | Contact information management methods and apparatus |
| EP3182666B1 (en) * | 2015-12-16 | 2023-01-25 | Materna Virtual Solution GmbH | Secure transmission of local private encoding data |
| US9722803B1 (en) | 2016-09-12 | 2017-08-01 | InfoSci, LLC | Systems and methods for device authentication |
| US10419226B2 (en) | 2016-09-12 | 2019-09-17 | InfoSci, LLC | Systems and methods for device authentication |
| US11463439B2 (en) | 2017-04-21 | 2022-10-04 | Qwerx Inc. | Systems and methods for device authentication and protection of communication on a system on chip |
| WO2024228716A2 (en) | 2022-07-11 | 2024-11-07 | Qwerx Inc. | Systems and methods for direct random number generation from quantum random events |
| US12238202B2 (en) | 2023-01-10 | 2025-02-25 | Qwerx Inc. | Systems and methods for continuous generation and management of ephemeral cryptographic keys |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1550083A (en) * | 2001-08-30 | 2004-11-24 | Method for encrypting and decrypting communication data | |
| CN1588897A (en) * | 2004-09-13 | 2005-03-02 | 深圳市中实科技有限公司 | Detecting and analyzing server, customer end and system for network digital communication signal |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020007351A1 (en) * | 2000-04-28 | 2002-01-17 | Hillegass James C. | Digital tokens and system and method relating to digital tokens |
| EP1436967A2 (en) * | 2001-10-19 | 2004-07-14 | Matsushita Electric Industrial Co., Ltd. | Device authentication system and device authentication method |
| JP3814620B2 (en) | 2004-10-15 | 2006-08-30 | 株式会社東芝 | Information processing apparatus and information processing method |
| US7764793B2 (en) * | 2005-10-20 | 2010-07-27 | General Instrument Corporation | Method to leverage a secure device to grant trust and identity to a second device |
-
2008
- 2008-07-04 EP EP08761424A patent/EP2301219A1/en not_active Withdrawn
- 2008-07-04 CN CN200880130137.1A patent/CN102077542B/en not_active Expired - Fee Related
- 2008-07-04 US US13/002,549 patent/US8782406B2/en active Active
- 2008-07-04 WO PCT/EP2008/058681 patent/WO2010000329A1/en not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1550083A (en) * | 2001-08-30 | 2004-11-24 | Method for encrypting and decrypting communication data | |
| CN1588897A (en) * | 2004-09-13 | 2005-03-02 | 深圳市中实科技有限公司 | Detecting and analyzing server, customer end and system for network digital communication signal |
Non-Patent Citations (1)
| Title |
|---|
| Packet-based multimedia communications systems;ITU;《Telecommunication Standardization Sector of ITU》;20030731;第86-87页,附图39 * |
Also Published As
| Publication number | Publication date |
|---|---|
| US20110154037A1 (en) | 2011-06-23 |
| US8782406B2 (en) | 2014-07-15 |
| EP2301219A1 (en) | 2011-03-30 |
| WO2010000329A1 (en) | 2010-01-07 |
| CN102077542A (en) | 2011-05-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP5432999B2 (en) | Encryption key distribution system | |
| CN101110831B (en) | Digital cryptographic key protection method | |
| Harney et al. | GSAKMP: Group secure association key management protocol | |
| US20030163700A1 (en) | Method and system for user generated keys and certificates | |
| CN102077542B (en) | Secure digital communications | |
| CN101466079A (en) | Method, system and WAPI terminal for transmitting e-mail | |
| WO2002093405A2 (en) | Method and device for transmitting an electronic message | |
| US7734913B2 (en) | Content transmission control device, content distribution device and content receiving device | |
| CN111934884A (en) | Certificate management method and device | |
| CN100403814C (en) | A key control method for multicast broadcast service | |
| CN106549858B (en) | Instant messaging encryption method based on identification password | |
| CN104200154A (en) | Identity based installation package signing method and identity based installation package signing device | |
| CN105743641B (en) | It is a kind of can explicit authentication public key multi-receiver label decryption method | |
| GB2381717A (en) | system and method , for secure data transmission, which includes generating a hash key using a character string and a private key | |
| CN100373844C (en) | Method for secret communication of embedded equipment | |
| Khurana et al. | Certified mailing lists | |
| CN101471775B (en) | Authentication method for MS and BS of WiMAX system | |
| CN100454807C (en) | A Method of Protecting Information Integrity | |
| US7730298B2 (en) | Method and apparatus for translating information between computers having different security management | |
| CN116318723A (en) | Cross-domain security document transfer method based on combined public key system | |
| CN101174945B (en) | Method for validating PUSH message and identity of its transmission part | |
| JP3796528B2 (en) | Communication system for performing content certification and content certification site device | |
| WO2011081589A1 (en) | Secure digital communications | |
| JP3725020B2 (en) | Electronic data content certification method and system | |
| US20070079114A1 (en) | Method and system for the communication of a message as well as a suitable key generator for this |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20141210 Termination date: 20180704 |